COMITY - Conflict avoidance in pervasive computing environments

被引:0
|
作者
Tuttlies, Verena [1 ]
Schiele, Gregor [1 ]
Becker, Christian [1 ]
机构
[1] Univ Mannheim, D-68131 Mannheim, Germany
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Pervasive Computing leads to novel challenges of application coordination. Applications may interfere with each other since they affect and share the same physical environment. A user that executes a navigation application utilizing a loudspeaker as output may annoy a user listening to music. To ensure a conflict-free execution of multiple applications, approaches are needed to avoid conflicts at runtime. In this paper we identify typical conflicts arising in Pervasive Computing. We propose how to detect potential conflicts by requiring applications to communicate their effects on the physical environment. After the detection, a suitable strategy is applied resolving the potential conflict. As a practical validation, we discuss how to model and avoid conflicts using our component-based software system PCOM.
引用
收藏
页码:763 / 772
页数:10
相关论文
共 50 条
  • [41] LooM: An anonymity quantification method in pervasive computing environments
    Imada, Miyuki
    Ohta, Masakatsu
    Yamaguchi, Masayasu
    [J]. 20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, 2006, : 92 - +
  • [42] An efficient multilateral negotiation system for pervasive computing environments
    Park, Sanghyun
    Yang, Sung-Bong
    [J]. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2008, 21 (04) : 633 - 643
  • [43] Context Routing in Heterogeneous Pervasive Computing Fieldwork Environments
    Johnson, Thienne
    Sadok, Djamel
    [J]. 2006 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC 2006), VOLS 1-4, 2006, : 211 - 216
  • [44] A service oriented flow pattern in pervasive computing environments
    Sui, Qi
    Wang, Hai-yang
    [J]. 2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 625 - +
  • [45] Mobile and internet services in ubiquitous and pervasive computing environments
    You, Ilsun
    Ogiela, Marek R.
    Chen, Yuh-Shyan
    Huang, Qingfeng
    [J]. INFORMATION SCIENCES, 2013, 230 : 1 - 2
  • [46] Secure and Private Service Discovery in Pervasive Computing Environments
    Zhu, Feng
    Zhu, Wei
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2009, 3 (03) : 107 - 122
  • [47] Intuitive human governance of autonomic pervasive computing environments
    O'Donnell, T
    Lewis, D
    Wade, V
    [J]. SIXTH IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS MOBILE AND MULTIMEDIA NETWORKS, PROCEEDINGS, 2005, : 532 - 536
  • [48] An adaptive data object service for pervasive computing environments
    Hess, CK
    Ballesteros, F
    Campbell, RH
    Mickunas, MD
    [J]. 6TH USENIX CONFERENCE OF OBJECT-ORIENTED TECHNOLOGIES AND SYSTEMS (COOTS 01), 2001, : 31 - 45
  • [49] Towards an intrusion detection system for pervasive computing environments
    Kannadiga, P
    Zulkernine, M
    Ahamed, SI
    [J]. ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, 2005, : 277 - 282
  • [50] A generic privacy enhancing technology for pervasive computing environments
    Dritsas, Stelios
    Tsaparas, John
    Gritzalis, Dimitris
    [J]. TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 103 - 113